Resource Type

Journal Article 143

Conference Videos 23

Year

2023 21

2022 31

2021 21

2020 17

2019 8

2018 10

2017 5

2016 4

2015 3

2014 2

2013 6

2011 3

2010 2

2009 4

2008 1

2007 4

2006 5

2005 3

2004 1

2003 3

open ︾

Keywords

digital image correlation 7

digital twin 5

COVID-19 2

Digital twin 2

Lattice 2

digital transformation 2

digital twins 2

homogenization 2

industrial software 2

intelligent manufacturing 2

3D magic-cube organization structure 1

3D printing 1

3D spatial components 1

3D virtual world 1

4-Bit reconfigurable antenna array 1

4D BIM 1

6G 1

6G mobile communication 1

> existence theorem 1

open ︾

Search scope:

排序: Display mode:

Current Status and Future Development of Quantum Cryptographic Protocols

Zhang Xue, Gao Fei, Qin Sujuan, Zhang Ping

Strategic Study of CAE 2022, Volume 24, Issue 4,   Pages 145-155 doi: 10.15302/J-SSCAE-2022.04.015

Abstract: In the future, practical quantum protocols for digital signature and two-party secure computation areprotocol" outline_type="title" type="outline">《6 Quantum digital signature protocol》

digital signature of quantum messages is not feasible even, which is different from the practical application of a digital signature.Therefore, it may be possible to design a quantum digital signature protocol with practical potential

Keywords: quantum cryptography     protocols     quantum key distribution     quantum digital signature     quantum private    

Development and Application of Network Electronic Identity Management in Major Countries and Regions around the World

Hu Chuanping,Chen Bing and Fang Binxing、Zou Xiang

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 99-103 doi: 10.15302/J-SSCAE-2016.06.020

Abstract:

This paper analyzes and sorts out the latest developments and typical applications of network electronic identity management in major countries and regions around the world, and discusses development trends in network identity management technology. It outlines network electronic identity management in China according to the 13th Five-Year Plan, including the development of ideas and constructive suggestions, the strengthening of network space identity management, and the construction of a network space identity management system. Such a system can help to regulate the behavior of Internet users, fight against network crime, build network power, safeguard national security and cyberspace sovereignty, and protect the privacy of network users; thus, it provides a reference for China’s network identity management development during the 13th Five-Year Plan.

Keywords: network electronic identity     identity management     digital signature    

Design of bio-oil additives via molecular signature descriptors using a multi-stage computer-aided molecular

Frontiers of Chemical Science and Engineering 2022, Volume 16, Issue 2,   Pages 168-182 doi: 10.1007/s11705-021-2056-8

Abstract: different property prediction models consist different levels of structural information, molecular signature

Keywords: computer-aided molecular design     bio-oil additives     molecular signature descriptor    

The Generating Lock P<G,X,X'>and Its Central Encrypting System

Shi Kaiquan,Chen Zexiong

Strategic Study of CAE 2000, Volume 2, Issue 2,   Pages 41-46

Abstract:

The conception of the generating lock  P <G ,X, X´> and the central encrypting system composed of P<G ,X, X´>with data generating technology are proposed in this paper[3〜6]. These systems include the generating lock P<G ,X, X´> and single-tooth central encrypting system, and the generating lock P <G ,X, X´> and multi-tooth central encrypting system. The single-tooth encrypting-decrypting algorithm multi-tooth encrypting-decrypting algorithm, multi-tooth static encrypting-decrypting algorithm, multi-tooth dynamic encrypting-decrypting algorithm as well as the structure character of central encrypting system are provided. The paper points out that arbitrary two persons A and B can choose irregular distributed positive integer sets, XA={x1, x2, …,xn}, XB ={x1,x2,…xm}, m≥4, n≥4, XAXB , respectively and complete their secret communication with P < G, X, X´>. The experiment result shows that the method proposed has good application character and security character.

Keywords: central encrypting system     multi-tooth encrypting-decrypting algorithm     P    X     X'     > existence theorem     digitalsignature uniqueness theorem    

Double-authentication-preventing signatures revisited: new definition and construction from chameleon hash None

Fei LI, Wei GAO, Gui-lin WANG, Ke-fei CHEN, Chun-ming TANG

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 2,   Pages 176-186 doi: 10.1631/FITEE.1700005

Abstract:

Double-authentication-preventing signature (DAPS) is a novel signature notion proposed at ESORICSsignatures on two different messages with the same subject will result in an immediate collapse of the signature

Keywords: Double-authentication-preventing signatures     Chameleon hash function     Digital signature     Provable security    

Efficient identity-based signature over NTRU lattice

Jia XIE,Yu-pu HU,Jun-tao GAO,Wen GAO

Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 2,   Pages 135-142 doi: 10.1631/FITEE.1500197

Abstract:

Identity-based signature has become an important technique for lightweight authentication as soonThereafter, identity-based signature schemes based on the integer factorization problem and discreteIn this study, an efficient identity-based signature scheme is presented over the number theory researchThe new scheme is more efficient than other lattice- and identity-based signature schemes.

Keywords: Identity     Signature     Lattice     Number theory research unit (NTRU)    

Certificateless broadcast multi-signature for network coding Research Article

Huifang YU, Zhewei QI

Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 9,   Pages 1369-1377 doi: 10.1631/FITEE.2200271

Abstract: To solve these problems, the certificateless broadcast multi-signature for (NC-CLBMS) method is devised, where each source node user generates a multi-signature about the message vector, and the intermediateNC-CLBMS is a multi-source multi-signature method with anti-pollution and anti-forgery advantages; moreover, it has a fixed signature length and its computation efficiency is very high.

Keywords: Network coding     Certificateless multi-signature     Linear combination     Homomorphic hash function    

Platform governance in the era of AI and the digital economy

Frontiers of Engineering Management 2023, Volume 10, Issue 1,   Pages 177-182 doi: 10.1007/s42524-022-0241-1

Abstract: . {{custom_ra.content}} . . . {{article.highlightEn}} . . . {{article.abstractEn}} . . . {{article.authorSummayEn}} .

Revisiting digital twins: Origins, fundamentals, and practices

Frontiers of Engineering Management   Pages 668-676 doi: 10.1007/s42524-022-0216-2

Abstract: The digital twins (DT) has quickly become a hot topic since it was proposed.

Keywords: virtual manufacturing     digital twins     modeling and simulation     digitization     computational engineering    

Development trend of urban design in “digital age”: Pan-dimensionality and individual-ubiquity

Frontiers of Structural and Civil Engineering 2021, Volume 15, Issue 3,   Pages 569-575 doi: 10.1007/s11709-021-0735-7

Abstract: The wave of “digital age” featuring digital information is coming.Digital technology is profoundly changing the societal development direction and evolution paths.creation and adaptation of material space forms that integrate humanities, art, technology and materials, digitalThe result of this evolution is “digital urban design paradigm based on human-computer interaction”,

Keywords: digital age     urban design     multiple objectives     human-computer interaction     pan-dimensionality     individual-ubiquity    

Machine learning modeling identifies hypertrophic cardiomyopathy subtypes with genetic signature

Frontiers of Medicine 2023, Volume 17, Issue 4,   Pages 768-780 doi: 10.1007/s11684-023-0982-1

Abstract: Previous studies have revealed that patients with hypertrophic cardiomyopathy (HCM) exhibit differences in symptom severity and prognosis, indicating potential HCM subtypes among these patients. Here, 793 patients with HCM were recruited at an average follow-up of 32.78 ± 27.58 months to identify potential HCM subtypes by performing consensus clustering on the basis of their echocardiography features. Furthermore, we proposed a systematic method for illustrating the relationship between the phenotype and genotype of each HCM subtype by using machine learning modeling and interactome network detection techniques based on whole-exome sequencing data. Another independent cohort that consisted of 414 patients with HCM was recruited to replicate the findings. Consequently, two subtypes characterized by different clinical outcomes were identified in HCM. Patients with subtype 2 presented asymmetric septal hypertrophy associated with a stable course, while those with subtype 1 displayed left ventricular systolic dysfunction and aggressive progression. Machine learning modeling based on personal whole-exome data identified 46 genes with mutation burden that could accurately predict subtype propensities. Furthermore, the patients in another cohort predicted as subtype 1 by the 46-gene model presented increased left ventricular end-diastolic diameter and reduced left ventricular ejection fraction. By employing echocardiography and genetic screening for the 46 genes, HCM can be classified into two subtypes with distinct clinical outcomes.

Keywords: machine learning methods     hypertrophic cardiomyopathy     genetic risk    

Novel efficient identity-based signature on lattices

Jiang-shan Chen, Yu-pu Hu, Hong-mei Liang, Wen Gao,JSChen@mnnu.edu.cn

Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 2,   Pages 141-286 doi: 10.1631/FITEE.1900318

Abstract: With the rapid development of electronic information technology, digital signature has become an indispensableTo overcome this problem, we construct an IBS scheme on s by employing Lyubashevsky’s signature scheme

Keywords: Identity-based signature     Lattice     Strong unforgeability     Random oracle model    

Embracing digital mindsets to ensure a sustainable future

Frontiers of Environmental Science & Engineering 2023, Volume 18, Issue 3, doi: 10.1007/s11783-024-1799-0

Keywords: Wildlife     Climate Change     Heavy metals     Noise     LAN     Light pollution    

Carcinogens that induce the A:T>T:A nucleotide substitutions in the genome

Guangbiao Zhou, Xinchun Zhao

Frontiers of Medicine 2018, Volume 12, Issue 2,   Pages 236-238 doi: 10.1007/s11684-017-0611-y

Abstract:

Recently, Ng . reported that the A:T>T:A substitutions, proposed to be a signature of aristolochicchloride and its reactive metabolites chloroethylene oxide, melphalan and chlorambucil, also cause this signature

Keywords: genomic signature     carcinogen     aristolochic acid     tobacco smoke     vinyl chloride     hepatocellular carcinoma    

Design of a digital currency information system based on the UnionPay network

Hongfeng CHAI, Quan SUN, Yu ZHOU, Tao ZHU

Frontiers of Engineering Management 2020, Volume 7, Issue 4,   Pages 471-484 doi: 10.1007/s42524-020-0134-0

Abstract: Digital currency can reduce the issuance and circulation costs of physical cash and improve the convenienceTherefore, digital currency has received widespread attention from central banks in recent years.system from three aspects, namely, digital currency account opening, exchange, and use, and furtherexpounds on the operation mechanism of a digital currency information system prototype.to realize the forward guidance function of the central bank digital currency.

Keywords: UnionPay network     digital currency     information system     blockchain     smart contracts    

Title Author Date Type Operation

Current Status and Future Development of Quantum Cryptographic Protocols

Zhang Xue, Gao Fei, Qin Sujuan, Zhang Ping

Journal Article

Development and Application of Network Electronic Identity Management in Major Countries and Regions around the World

Hu Chuanping,Chen Bing and Fang Binxing、Zou Xiang

Journal Article

Design of bio-oil additives via molecular signature descriptors using a multi-stage computer-aided molecular

Journal Article

The Generating Lock P<G,X,X'>and Its Central Encrypting System

Shi Kaiquan,Chen Zexiong

Journal Article

Double-authentication-preventing signatures revisited: new definition and construction from chameleon hash

Fei LI, Wei GAO, Gui-lin WANG, Ke-fei CHEN, Chun-ming TANG

Journal Article

Efficient identity-based signature over NTRU lattice

Jia XIE,Yu-pu HU,Jun-tao GAO,Wen GAO

Journal Article

Certificateless broadcast multi-signature for network coding

Huifang YU, Zhewei QI

Journal Article

Platform governance in the era of AI and the digital economy

Journal Article

Revisiting digital twins: Origins, fundamentals, and practices

Journal Article

Development trend of urban design in “digital age”: Pan-dimensionality and individual-ubiquity

Journal Article

Machine learning modeling identifies hypertrophic cardiomyopathy subtypes with genetic signature

Journal Article

Novel efficient identity-based signature on lattices

Jiang-shan Chen, Yu-pu Hu, Hong-mei Liang, Wen Gao,JSChen@mnnu.edu.cn

Journal Article

Embracing digital mindsets to ensure a sustainable future

Journal Article

Carcinogens that induce the A:T>T:A nucleotide substitutions in the genome

Guangbiao Zhou, Xinchun Zhao

Journal Article

Design of a digital currency information system based on the UnionPay network

Hongfeng CHAI, Quan SUN, Yu ZHOU, Tao ZHU

Journal Article